Good questions on 10g

i need some information on what types of questions come in 10g which a 10g person should be knowing.
Any web-site or documentation will be helpful.
I hope, my question is clear. Please help, in solving the doubt.
regards.

Hi,
As Frank just told you.
Here you have the link to get every doc. about AS
http://www.oracle.com/technology/documentation/appserver.html
I hope U have enough on this information otherwise let me know.
Cheers,
Hamdy

Similar Messages

  • Pls send Some good question and answer related to FI

    Hi Gurus,
    Pls. send some <b>good question and answer</b> .i need urgently.
    Pls help me.
    regds
    Mahesh K Singh

    Hello
    Sent.
    Material collected from the following link
    http://www.sap-basis-abap.com/sapfi.htm
    Reg
    *assign points if useful

  • Good question about Exporting to tape

    Somebody asked me this and I thought it was a good question. And I dont know the answer!
    When a camera is connected to FCE, whatever plays on the timeline plays on the camera viewfinder, right? So instead of using PRINT TO VIDEO why wouldnt we just manually press record on the camera and just tape the movie straight off the timeline?
    Is there some kind of quality loss if you do this?
    Just seems to be a quicker and easier way to get the movie to tape.

    While this works just fine, there are some issues. I.E., it is a lot easier to interrupt your recording when playing straight from the timeline (press the wrong key, have another app switch over, etc).
    Print To Video (as far as I know) can only be interrupted with the ESC key.
    Also, in Print to Video, FCP makes sure everything is rendered, and you can add color bars, slate, black, etc to the beginning if needed.

  • How long should it take for an answer on a question Cisco agree's is a good question and agree to work on it?

    Guys,
    How long should it take for an answer on a question Cisco agree's is a good question and agree to work on it?
    I have an RVS-4000 and it sends me error message by email on errors. Yet I do not have any documentation on what these error messages mean. I asked these question last May and still have not received any answers.
    I was told it had been forwarded to a engineer for creatation of this documentation in May. Here we are...
    Do any of you agree we need this type of documentation on our Routers? I think it should have been created before these where sold and included with these Routers. Maybe if we all voted on it. Then It might still happen?
    Please add you reply's to this. As it might help to get things moving...
    Bruce

    I created a track on my computer and added it to iTunes
    iCloud only syncs and stores purchases from the iTunes Store.
    "With iCloud, the music, movies, TV shows, and other iTunes content you’ve purchased are available to download to your devices". 
    Apple - iCloud - All your content on all your devices.

  • Should good questions earn points?

    Good questions enable knowledgable community members to post correct and helpful answers. Good questions are pertinent, articulate, short and articulate. They help folks earn points.
    In this world every point counts!
    Thanks!

    IL Birder wrote:
    In this world every point counts!
    Thanks!
    in which world? in my opion the best reward i could get for asking a good question is getting that question answered.  I could care less about 5 or 10 points when im trying to finish an imovie project, but i'll happily give them to the person who helped me out.
    -mvimp

  • Question: 9i- 10g

    Hi all,
    What does anyone know or have an opinion regarding 10g's ability with Virtual Private Databases/Row level security and Unix based servers providing client-server forms and reports services to browser based windows and unix clients?
    My organisation has been stuck in Forms 6 land because of heavy limitations of Forms 9's ability to handle row level security in this situation and I was curious to know if anyone has upgraded to 10g and resolved any issues in that regards.
    Thanks all.

    This is another article:
    TECHNOLOGY: Security
    Keeping Information Private with VPD
    By Arup Nanda
    Oracle's row-level security gives users their own virtual private databases.
    Ensuring appropriate information privacy is a pressing concern for many businesses today, given privacy legislation such as the United States' HIPAA (Health Insurance Portability and Accountability Act), Gramm-Leach-Bliley Act, Sarbanes-Oxley Act, and the EU's Safe Harbour Law. Other privacy mandates, such as Visa's Cardholder Information Security Program (CISP), also require businesses to ensure that access to information is tightly controlled.
    Oracle has always included the ability to grant (or deny) users access to database objects, but these privileges are defined at the object level—for an entire table, not for specific rows in that table. Although that approach is sufficient for many applications, any application touching on financial, health, or other kinds of personal information usually requires more-discrete controls over access and authorization.
    Oracle's row-level security (RLS) feature, introduced in Oracle8i, provides fine-grained access control—fine-grained means at the individual row level. Rather than opening up an entire table to any individual user who has any privileges on the table, row-level security restricts access to specific rows in a table. The result is that any individual user sees a completely different set of data—only the data that person is authorized to see—so the overall capabilities are sometimes referred to as Oracle's virtual private database, or VPD, feature.
    Using Oracle's VPD capabilities not only ensures that companies can build secure databases to adhere to privacy policies but also provides a more manageable approach to application development, because although the VPD-based policies restrict access to the database tables, they can be easily changed when necessary, without requiring modifications to application code.
    For example, say a bank's account managers (AMs) provide personal customer support to high-net-worth account holders. AMs use a custom banking application to help them check their customers' balances, deposit or withdraw funds, and decide on loan requirements, for example. At one time, the bank's policy was to allow all AMs to access all account holder information, but that policy was recently changed. Now, AMs are assigned to a particular set of customers, and they need to be able to access information pertaining only to those customers. The policy change needs to be reflected in the application, which currently shows all customer information to each AM, not just information on the customers to whom each particular AM is assigned.
    To make the application comply with the new privacy policy, the bank has three choices:
    Modify the application code to include a predicate (a WHERE clause) for all SQL statements. This option doesn't ensure privacy policy enforcement outside the application, however, and if there are other changes in the future, the code will once again have to be modified, so this is not a good approach in the long term.
    Leave the application intact, creating views with the necessary predicates and creating synonyms with the same name as the table names for these views. This option is better from the perspective of application changes and security, but it can be difficult to administer, because of the potentially large number of views to track and manage.
    Create a VPD for each of the AMs by creating policy functions that generate dynamic predicates, which can then be applied across all objects, regardless of how they are accessed, by setting up policies with the row-level-security built-in package (DBMS_RLS).
    This last option offers the best security without administrative overhead and ensures complete privacy of information—all the account managers see a different view of the table, according to their own credentials.
    This article shows you how to set up a VPD security model. It goes through the process by using the foregoing bank scenario to create policy functions, define policies, and then test results. (Note that the tables are not completely defined, to keep the example simple.)
    Basic Setup for the Example Application
    Briefly, here are the basic assumptions about the example bank application:
    A BANK schema owns two key tables that make up the application—a CUSTOMERS table:
    Name Null? Type
    CUST_ID NOT NULL NUMBER
    CUST_NAME NOT NULL VARCHAR2(20)
    and an ACCOUNTS table:
    Name Null? Type
    ACCT_NO NOT NULL NUMBER
    CUST_ID NOT NULL NUMBER
    BALANCE NUMBER(15,2)
    Listing 1 comprises the SQL script for creating and populating these two basic example tables.
    User SECMAN (security manager) owns an ACCESS_POLICY table that identifies the AMs and their respective customer accounts:
    Name Null? Type
    AM_NAME NOT NULL VARCHAR2(20)
    CUST_ID NOT NULL NUMBER
    ACCESS_TYPE NOT NULL CHAR(1)
    The AM_NAME column stores the user ID of the account manager; CUST_ID identifies the customer; and ACCESS_TYPE defines the specific access entitlement—S (SELECT), I (INSERT), D (DELETE), or U (UPDATE). Some example records from the ACCESS_POLICY table follow:
    AM_NAME CUST_ID ACCESS_TYPE
    SCOTT 123 S
    SCOTT 123 I
    SCOTT 123 D
    SCOTT 123 U
    SCOTT 456 S
    SCOTT 789 S
    LARA 456 I
    LARA 456 D
    LARA 456 U
    LARA 456 S
    As you can see, SCOTT, the AM for customer 123, has all privileges—S, I, D, and U—as does LARA for customer 456. Also, because SCOTT can confirm account balances for one customer of LARA, he has S privileges on customer 456.
    Step 1. Create a Policy Function
    The bank's access rules (contained in the ACCESS_POLICY table) must be applied somehow, dynamically, whenever an AM tries to look into customer account information. The first step is to create a policy function that returns the appropriate predicate to be applied to the table. As with the ACCESS_POLICY table, the policy functions are created and controlled by user SECMAN, for security purposes. It's best to keep privacy rules separate from the tables to which they apply.
    Let's examine the policy function, get_sel_cust_id—shown in Listing 2— in detail:
    Accepts exactly two parameters: the schema name (p_schema in varchar2) and the table name (p_table in varchar2)
    Returns one value only, a string—return varchar2 as l_retstr varchar2(2000);—comprising the predicate that will be appended to every query on the table
    Uses a cursor routine—for cust_ rec in—to get the list of values, because each user may have several cust_ids listed in the table
    Returns a constructed string—l_retstr—to be used as a predicate whenever any user attempts to access the underlying table
    The function returns the predicate where cust_id in with the appended list of customer accounts (cust_id), separated by commas, that the user (am_name = USER) is allowed to see.
    Note that before entering the loop that builds the list of cust_ids for the user, the code in Listing 2 checks to see if the user is the table owner BANK, in which case the function returns a NULL predicate, as follows:
    if (p_schema = user) then
    1_retstr := null;
    After building this function, you want to make sure it returns the appropriate predicate, by testing some sample data. Connect to the database as SECMAN, and insert some records into the ACCESS_POLICY table, giving SECMAN read privileges on a few sample accounts, as follows:
    insert into access_policy values ('SECMAN',123,'S');
    insert into access_policy values ('SECMAN',456,'S');
    insert into access_policy values ('SECMAN',789,'S');
    Now execute the function:
    select get_sel_cust_id
    ('BANK','CUSTOMERS') from dual;
    The function returns a string that will be applied as a predicate, as shown in the following sample output:
    GET_SEL_CUST_ID('BANK','CUSTOMERS')
    CUST_ID IN (123,456,789)
    You need to create similar functions for the other types of access. For simplicity's sake, create a single function for all the other access types—UPDATE, DELETE, INSERT—as shown in Listing 3. However, note that for a real-world application, each type of access should have its own individual function defined, to ensure appropriate privacy.
    The policy function in Listing 3 is nearly identical to the policy function in Listing 2, except that the predicate is further qualified by use of the information from the ACCESS_CONTROL table:
    and access_type in ('I', 'U', 'D')
    Creating a policy function is just the first step. You now need to ensure that the function will be used, by defining the policy that should control its use in your system.
    Step 2. Define a Policy
    Policies are defined with the DBMS_RLS package, which is Oracle-supplied. Be aware that the policies themselves are not database objects owned by any user (schema); they are logical constructs. Any user who has the execute privilege on the DBMS_RLS package can modify or drop a policy created by another user. Privileges to DBMS_RLS should be judiciously controlled and granted with caution.
    In the following example, user SECMAN is granted execute privileges (by SYS) on the DBMS_RLS package:
    grant execute on dbms_rls to secman;
    Listing 4 creates a policy named CUST_SEL_POLICY on the table CUSTOMERS of schema BANK. This policy applies the predicate returned by the function GET_SEL_CUST_ID (which is shown in Listing 2) owned by schema SECMAN to all SELECT statements on the table.
    Similarly, you place another policy on the table for other access types, as shown in Listing 5. This policy applies to inserts, updates, and deletes in the CUSTOMERS table.
    It is almost identical to the SELECT policy, except that this policy includes a check that ensures that the policy will remain compliant even after an update:
    update_check => TRUE
    Data cannot be added to the table unless it adheres to the policy.
    Step 3. Test the Setup
    Now that the building blocks are in place, let's see how they work. Connecting as user BANK and issuing a simple select * from customers; query displays the following:
    CUST_ID CUST_NAME
    123 Jay Kulkarni
    456 Wim Patel
    These two records are the full contents of the CUSTOMERS table, and both records are shown because BANK owns the table, so the predicate clause is NULL—that is, no predicate is applied. However, when user LARA makes the same query, she sees the following:
    select * from customers;
    CUST_ID CUST_NAME
    456 WIM PATEL
    LARA sees only CUST_ID 456, not 123, because that is the row she is authorized to see, as determined by the ACCESS_ POLICY table. Note that the query has no WHERE clause but that the selection from the table is automatically filtered to show only the authorized rows.
    If user SCOTT makes the same query, his results are different from the results for LARA: select * from customers;
    CUST_ID CUST_NAME
    123 Jay Kulkarni
    456 Wim Patel
    User SCOTT sees both rows, because he is authorized to do so, as shown in the ACCESS_POLICY table. When user LARA issues the query, the policy function get_sel_cust_id returns the predicate where cust_id in (456). Lara's original query select * from customers is rewritten as
    select * from
    (select * from customers)
    where cust_id in (456)
    The predicate is automatically appended to the user's original query. The same thing happens when the user updates the table:
    SQL> update bank.customers
    2 set cust_name = 'PAT TERRY';
    1 row updated.
    Note that in this example, only one row is updated, even though there are actually two rows in the underlying table. The policy (CUST_IUD_POLICY) appends the predicate where cust_id in (456) to the update statement. Similarly, while the table is being deleted, only the rows for which the user is authorized are deleted.
    Attempting to insert a row containing data for which the user is not authorized results in an error message. For example, in this query, LARA is attempting to add a record to the CUSTOMER table for an account not under her purview: Next Steps
    READ more about
    VPD Oracle9i Supplied PL/SQL Packages and Types Reference
    Oracle Privacy Security Auditing
    SQL> insert into bank.customers
    2 values (789,'KIM PARK');
    insert into bank.customers
    ERROR at line 1:
    ORA-28115: policy with check option
    violation
    According to the ACCESS_POLICY table, Scott has SELECT privileges on account 789—no other privileges for any other AM are listed in the table.
    Using policies in conjunction with functions ensures authorized access to specific records of a table. The rules are applied regardless of how the table is accessed, whether through an application or directly through an ad hoc query tool, such as SQL*Plus. Users see only rows for which they have been authorized.
    Policies can be applied to multiple tables, and a single policy function can be used by any number of policies. Listing 6 shows a policy on an ACCOUNTS table that uses the get_sel_cust_id function initially created for use with the CUSTOMERS table.
    Arup Nanda ([email protected]) is the chief database architect at Proligence Solutions ( Printer View
    http://otn.oracle.com/oramag/oracle/04-mar/o24tech_security.html
    Joel Pérez
    http://otn.oracle.com/experts

  • Yes ! If you want a good answer,ask a good question,,...

    ...but shouldn't the "answeree" ,at least  try to ask themselves "what if this were "my" problem would that be catorgorized as a worthy question..thus recieving a worthy "answer?
    My b/w cartridge,was inserted then after ZI had to pull it out again..why? because the carriage wasn't sliding "back" to the far right ceratinly I cannot insert the Tri-color" into the slot "after" the mecanisism has moved,& stayed whwrre it's impossible to insert any cart- in while in that position..anyway..right?
    So "if it were you? What would you do? I...
    tried to get it out it staed like I said before..the-"HP" book- that came{ w/ hp} is misplaced  something I never do..is loose info I like "words" unlike online messages re:"How To's..NO matter what I pulled,pushed,couldn't get it out so what do they mean by machine must be plugged in  I thouhjt I got a shock nothing big but read the steps you'll see  "Hp is telling you machime must be on..the directions are contradictory..
    Waht is holding it so tightly in place? I know this is stipid but when desperation grabs you..well you'll ask anything
    Can you INSERT cart{color] on left while carriage is on the right..of course bot..the sides are fatter,lacking slack room..
    would you just "give it a good PULL?
    Did I pass the "correct answer test? I do think that's clever however,,I oftentimes have no patiernce for stupid people so usually stupid questions are sure to come..one must learn tyo either ignore them,or go against one's grain by "yessing them" You learn these things as you get older you know! Are you Bob Headrick?Can you please help me?
    1- Will I break this by getting it out?
    2- Message box: Cartridge missing{there was one} or..Both are missing but why did it state both..:
    Would you or anyone here do this are you people following me?? The message is the same as many others have said there's also said.   ".missing cartridge" even though "one" was in? jentilpet

    OK, you must have read this post but it would help to read it again.  What is your printer model?  It sounds like you may be having trouble changing the print cartridges.  You do need to have the printer plugged in and turned on to be able to access the cartridges.  I have never seen any HP documentation that would suggest otherwise.  Generally you would open the lid on the printer and the cartridges would be moved to a location where you could access them.  It really does depend on your printer.  What is your printer model?
    You can download the manual for your HP printer from a link here.  Enter the printer model of your printer, click on Solve a Problem and then look on the right side of the page for a link to the manual.
    Bob Headrick,  HP Expert
    I am not an employee of HP, I am a volunteer posting here on my own time.
    If your problem is solved please click the "Accept as Solution" button ------------V
    If my answer was helpful please click the "Thumbs Up" to say "Thank You"--V

  • Want good answers? Ask good questions!

    Following are some tips to get the best responses in the forum:   
    Search before posting  Use the "Search" box to see if someone has already asked and answered your question.
    Use the Forum, not email  This way others can contribute to and benefit from the answers.
    Write good titles  Put a short problem description as well as your printer model in the title.
    Provide details  Be sure to give relevant information including:
    Problem Description
    Printer Model
    Operating System  (including service pack revision)
    Connection Method - USB, Hardwired LAN, Wireless?
    Error messages - on printer screen and/or computer, any blinking light patterns.  
    Watch for Feedback   Subscribe to email updates for your question and/or check your question frequently for responses.  Answer promptly any requests for additional information.
    Say "Thanks".  When you get an answer to your problem acknowledge the solution.  If the answer is helpful mark it with "Kudos" by clicking on the kudos button.  If your problem is solved then mark it as solved.  This will help others with similar issues find the solution.
    Regards,
    DaniW
    HP Forum Admin
    --Say "Thanks" by clicking the Kudos Star in the post that helped you.
    --Please mark the post that solves your problem as "Accepted Solution"

    Hi--I am trying to get the (HP smart web printing Icon on my tool bar in Internet Explorer)
    Can you help. Thanks-Tom Moir

  • Frmwebutil.jar Question w/ 10g (9.0.4)

    All over the Oracle documentation w/ Dev Suite and Webutil configurations it refers to frmwebutil.jar and sometimes f90webutil.jar.
    My question is, are we to use both files in various places w/ 10g (version 9.0.4) or use one or the other exclusively?
    If we are to use f90webutil.jar then I assume every reference directing us to frmwebutil.jar, we replace w/ f90webutil.jar, including signing the jar files adding to registry, .cfg files, etc...correct?
    thank you.

    Hello,
    using one of them is enough,Oracle Developer Suite 10g Release 2 (10.1.2) uses frmwebutil.jar. and the earlier release uses dev suite f90webutil.jar
    I think in your case you can use frmwebutil.jar alone.
    Regards
    Mohan

  • Small but good question???

    Hi,
    I have a question I am always seeing something new coming in Cisco field like different technologies and commands like for example ASA object group is new in ASA 9 or 8.4 version ..so .just amazed that how u all guys keep up with all these materials and things ?????
    My mind stuck with all these ...still learning new things,,,but again I found something and something on net OMG !!!!!
    Any expert answer for me ????What to do to keep up or ignore small points as I am not working in field have no clear idea....
    Thanks,

    Hi Anand,
    For new features keep an eye on the release notes that are issued with each IOS update for you chosen platform.
    Best practive configuration can be gleaned from the CLI configration guides that are released for each IOS/ platform combination.
    Loads of real world knowledge an neat tricks can be found on this forum right here!
    For now everything is new and exciting. Over time you'll establish baseline knowledge form where you'll work out what is new, exciting and relevant for choosen networking path.
    Good luck with you studies!
    cheers,
    Seb.

  • Is there a good sample of 10g r3 functionality out there.

    I remember people.bea.com and that was a good example of profile information as well as a bunch of other features of 6.5 when it came out. Now Oracle has shut that site down or at least locked it down pretty tight. Is there a sample site like this that shows off 11g r3 release? I looked at Mix, but I don't even know if that is done in plumtree or some other oracle portal or just straight html. I have a meeting in a couple of days to discuss enterprise 2.0 and I would like to be able to display some 11g r3 features.
    Any discussion on this would be great.
    Berney

    I got this in an email this morning and thought it might be of use to you:
    Title: Why WCI - Enabling the Social Enterprise
    Date: Thursday, April 9, 2009
    Time: 1:00 pm Eastern (30 minutes)
    Features Web Center Interaction (WCI 10gR3), formerly Aqualogic User Interaction.
    This presentation will include:
    Benefits of upgrading.
    Setting User Experiences based on User-Agent headers. Did you say Mobile device? Oh yes, indeed.
    WCI featured services: Blog & Wiki integration
    Register for the webinar today: http://www.spheric.ca/contact/wci-webinar-signup
    About the speaker:
    Adam MacDonald has been working with Plumtree/Aqualogic/WCI for 8 years and has over 9 years of industry experience across consulting and software engineering. Adam has been a member of BEA's World Wide Consulting Enterprise Architecture team where he assisted consultants and customers through the development of BEA's SOA-based collateral and offerings. Adam has been involved with over 180 Portal implementations, upgrades and innumerable customizations.

  • Upgrade question from 10g to 11gr1

    Hi All
    Planning to upgrade 10.2.0.4.0 to 11.1.0.7.0
    After executing utlu111i.sql
    SQL> @utlu111i.sql
    Oracle Database 11.1 Pre-Upgrade Information Tool    07-19-2011 10:56:38
    Database:
    --> name:          TEST
    --> version:       10.2.0.4.0
    --> compatible:    10.2.0.1.0
    --> blocksize:     8192
    --> platform:      Linux x86 64-bit
    --> timezone file: V4
    -----Truncated-----------------
    Components: [The following database components will be upgraded or installed]
    --> Oracle Catalog Views         [upgrade]  VALID
    --> Oracle Packages and Types    [upgrade]  VALID
    --> JServer JAVA Virtual Machine [upgrade]  VALID
    --> Oracle XDK for Java          [upgrade]  VALID
    --> Oracle Workspace Manager     [upgrade]  VALID
    --> OLAP Analytic Workspace      [upgrade]  VALID
    --> OLAP Catalog                 [upgrade]  VALID
    --> EM Repository                [upgrade]  VALID
    --> Oracle Text                  [upgrade]  VALID
    --> Oracle XML Database          [upgrade]  VALID
    --> Oracle Java Packages         [upgrade]  VALID
    --> Oracle interMedia            [upgrade]  VALID
    --> Spatial                      [upgrade]  VALID
    --> Data Mining                  [upgrade]  VALID
    --> Expression Filter            [upgrade]  VALID
    --> Rule Manager                 [upgrade]  VALID
    --> Oracle OLAP API              [upgrade]  INVALID
    **********************************************************************My question is Oracle OLAP API is invalid. Shall i go ahead with the upgrade or do i need to make it valid before upgrade? if so how?
    Thanks
    Ak

    ok So now getting
    --> Oracle Packages and Types [upgrade] INVALID
    Components: [The following database components will be upgraded or installed]
    --> Oracle Catalog Views         [upgrade]  VALID
    --> Oracle Packages and Types    [upgrade]  INVALID
    --> JServer JAVA Virtual Machine [upgrade]  VALID
    --> Oracle XDK for Java          [upgrade]  VALID
    --> Oracle Workspace Manager     [upgrade]  VALID
    --> OLAP Analytic Workspace      [upgrade]  VALID
    --> OLAP Catalog                 [upgrade]  VALID
    --> EM Repository                [upgrade]  VALID
    --> Oracle Text                  [upgrade]  VALID
    --> Oracle XML Database          [upgrade]  VALID
    --> Oracle Java Packages         [upgrade]  VALID
    --> Oracle interMedia            [upgrade]  VALID
    --> Spatial                      [upgrade]  VALID
    --> Data Mining                  [upgrade]  VALID
    --> Expression Filter            [upgrade]  VALID
    --> Rule Manager                 [upgrade]  VALID
    --> Oracle OLAP API              [upgrade]  VALID
    **********************************************************************

  • I have a good question does how many things we have in the dock station

    Slow our computer down, I used to have a pc and the more you had on your taskbar the slower the system was. Does the same thing happen with my Imac or does it not matter. If it does slow things down I would like a recomendation on how many programs I should put in the dock station without affecting my systems's performance

    Good questions!
    You will only really be adding 512MB because you'll have to replace one of the 512MB's with the 1GB. If you are using that much ram for your everyday usage you should consider upgrading your ram to 2GB (2x1GB) modules. You will get a little better price on a 2GB kit, but you can upgrade 1GB now and one later if you wish.
    The ScreenSaver "Options/Settings" like the Dock won't make any difference, but letting it run will.
    If you go to: "Macintosh HD / Application / Utilities" you will see an App. called "Activity Monitor" open it to see all your processes. If you want you can drag a copy of the icon to your Dock same as other App's, it uses 10MB when open so quit when your not using it as well.
    Dennis
    17" iMac Intel Core Duo 1.5GB Ram   Mac OS X (10.4.9)   Maxtor 300GB FireWire Creative Inspire 2.1 2G Nano

  • To find unique date... Good question

    Consider the following tables in your schema.
    1. TOPTEN_SHIPS
    2. TOPTEN_BATTLES
    A typical SHIPS record would be:
    (1,'New Jersey', 1943, 'USA', 9, 16, 46000)
    Which means that the battleship New Jersey with id 1 was launched in 1943; it belonged to the USA, carried 9 guns of size 16-inch (bore, or inside diameter of the barrel), and weighted (displaced, in nautical terms) 46,000 tons.
    A typical record for BATTLES is:
    (1, 'North Atlantic', 1,'sunk')
    That is, ship with id 1 (i.e. New Jersey) was ‘sunk’ in the battle (with id 1) of the North Atlantic.
    Write the following queries:
    (a) Grade: Medium
    Recommended Time to be spent on the question: 20 min
    List all the pairs of countries that fought each other in battles. List each pair only once, and list them with the country that comes first in alphabetical order first. Let’s say the country names are C1 and C2. C1 should appear first over C2 based on alphabetical order. Additionally C1 should only start with alphabet A.
    The output should be ordered by country1, country2.
    TOPTEN_SHIPS          
    TS_SHIP_ID     NOT NULL     NUMBER(10)
    TS_SHIP_NAME          VARCHAR2(100)
    TS_YEAR_LAUNCHED          DATE
    TS_COUNTRY          VARCHAR2(100)
    TS_NUM_GUNS          NUMBER(10)
    TS_GUN_SIZE          NUMBER(10,2)
    TS_DISPLACEMENT          NUMBER(10)
    TOPTEN_BATTLES          
    TB_BATTLE_ID     NOT NULL     NUMBER(10)
    TB_BATTLE_NAME          VARCHAR2(100)
    TB_SHIP_ID     NOT NULL     NUMBER(10)
    TB_RESULT          VARCHAR2(50)

    if you want a generic method you can do something like this...
    WITH t AS
      ( SELECT 'A' c1,'B' c2,'C' c3 FROM dual
    UNION ALL
       SELECT 'A' c1,'B' c2,'D' c3 FROM dual
    UNION ALL
       SELECT 'B' c1,'C' c2,'A' c3 FROM dual
    UNION ALL
       SELECT 'C' c1,'A' c2,'B' c3 FROM dual
    UNION ALL
       SELECT 'D' c1,'B' c2,'A' c3 FROM dual
    SELECT DISTINCT ltrim(sys_connect_by_path(cvalue,','),',') finval
       FROM
      (SELECT c1           ,
        c2                 ,
        c3                 ,
        column_value cvalue,
        row_number() over (partition BY c1,c2,c3 order by column_value ) rnum
         FROM t,
        TABLE(sys.odcivarchar2list(c1,c2,c3))
      WHERE CONNECT_BY_ISLEAF =1
      CONNECT BY prior rnum   =rnum-1
    AND prior c1              =c1
    AND prior c2              =c2
    AND prior c3              =c3
      START WITH rnum         =1But still if you want unique out of 4 columns then you need to change the above one accordingly.
    Ravi Kumar

  • Sims 2 - Trust Me its a good question!!!

    Just wondering, Aspyr's gonna release Sims 2 Nightlife next week:
    1. Will it be released universal?
    and if so how will it run?
    Since it is an expansion pack, it still need files from
    the PPC Native Sims 2 Disk to run, So will it run choppy or smooth?
    Do you think it will matter? Or is this something to be concerned about??

    I have not heard of Sims 2 Nightlife, however they have released The Sims Complete Collection. The collection combines Aspyr’s Mac conversion of the original The Sims game with all of its expansion packs together for $49.99.
    The Sims Collection includes The Sims, Hot Date, House Party, Livin’ Large, Makin’ Magic, Superstar, Unleashed and Vacation. The collection has been rated “T” for Teen by the ESRB.
    System requirements call for Mac OS X v10.3.9 or later, G3/500MHz or faster, 256MB RAM, 3.5GB hard disk space and DVD drive. Although the collection hasn’t been updated to run natively on Intel-based Macs, an Aspyr spokesperson told Macworld that the collection has been “tested and runs with good stability and playable frame rates” under Rosetta.
    Hope this helps.

Maybe you are looking for